Login or create an account to download this report
One thing is certain about malware and that is that the onslaught never stops. And, the longer malware remains on a computing device before detection, the greater the chances it will become activated and cause harm. Crytica Security's detection system has been created and designed to significantly reduce Advanced Persistent Threats (APT), including previously undocumented threats, and malware dwell time. It empowers Linux and Windows environments to detect threats rapidly with minimal resource consumption.
Crytica Security commissioned Tolly to compare the efficacy, responsiveness, and resource demands of its Crytica Rapid Detection & Alert (RDA) with Microsoft Defender in Windows 11 and Linux environments in detecting the presence of known malicious executable files as well as unknown, “zero-day” executables.
RDA identified 100% of the known-malware test samples compared to ~95% for Microsoft in both environments. Importantly, RDA detected the samples within seconds of their arrival on the test computers, detected them automatically, and demonstrated low CPU usage and a small memory footprint essential for IoT/OT deployments. Crytica RDA found 100% of zero-day malware executables, where the competing solution detected only 50% of the malware and, then, only after decryption.